Which of the following is a network address used to identify devices in layer three of the OSI model?
Which of the following is a network address used to identify devices in layer three of the OSI model?A . TCP port numberB . DNS addressC . MAC addressD . IP addressView AnswerAnswer: D
What is a common function of adware?
What is a common function of adware?A . Encrypting data on a systemB . Stealing sensitive informationC . Displaying unwanted advertisementsD . Providing remote access to a systemView AnswerAnswer: C
Which of the following backup types only copies data that has changed since the last backup, regardless of which type of backup it was last performed?
Which of the following backup types only copies data that has changed since the last backup, regardless of which type of backup it was last performed?A . Full backupB . Incremental backupC . Differential backupD . Synthetic backupView AnswerAnswer: B
Which term describes the ability to prove that a specific individual or entity performed an action, such as sending a message or conducting a transaction?
Which term describes the ability to prove that a specific individual or entity performed an action, such as sending a message or conducting a transaction?A . Non-repudiationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: A
Which of the following is used to verify the identity of a website?
Which of the following is used to verify the identity of a website?A . X.509 digital certificateB . SSL/TLSC . Certificate Signing Request (CSR)D . Diffie-Hellman key exchangeView AnswerAnswer: A
Which of the following is the role of OpenPGP key servers?
Which of the following is the role of OpenPGP key servers?A . OpenPGP key servers manage email communications.B . OpenPGP key servers are only used with Mozilla Thunderbird.C . OpenPGP key servers provide antivirus protection for email communications.D . They allow users to store and retrieve public keys associated with...
Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?
Which of the following encryption methods is used for email encryption and requires the use of a public key and a private key pair?A . Certificate AuthorityB . S/MIMEC . OpenPGPD . SMTP STARTTLSView AnswerAnswer: C
What is the purpose of The Onion Router (TOR) network?
What is the purpose of The Onion Router (TOR) network?A . Anonymity and PrivacyB . Network MonitoringC . Data StorageD . Speed OptimizationView AnswerAnswer: A
What is OpenPGP?
What is OpenPGP?A . An email client for encryption and signing messages.B . An open-source implementation of the S/MIME standard.C . An open standard for email encryption and signing using public key cryptography.D . A certificate authority (CA) for S/MIME encryption.View AnswerAnswer: C
Which of the following is a security implication of shared access to data in the cloud?
Which of the following is a security implication of shared access to data in the cloud?A . Increased risk of unauthorized access to dataB . Improved data securityC . Improved data accessibilityD . Decreased risk of data lossView AnswerAnswer: A